+

Kato et al., 2001 - Google Patents

Risk analysis and secure protocol design for WWW-based remote control with operation-privilege management

Kato et al., 2001

Document ID
17924862497428982292
Author
Kato H
Furuya M
Tamano-Mori M
Kaneko S
Nakano T
Publication year
Publication venue
2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat. No. 01CH37236)

External Links

Snippet

The paper discusses security issues related to the use of the Internet for remote control of decentralized systems. After conducting risk analysis based on the detection of potential threats, we designed a Secure Tele-operation Protocol (STP) specification for Internet-based …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Garg et al. Securing iot devices and securelyconnecting the dots using rest api and middleware
US8910241B2 (en) Computer security system
US7231526B2 (en) System and method for validating a network session
Varadharajan et al. An analysis of the proxy problem in distributed systems
KR101076848B1 (en) Reducing network configuration complexity with transparent virtual private networks
CA2654381C (en) Policy driven, credential delegation for single sign on and secure access to network resources
US7992200B2 (en) Secure sharing of transport layer security session keys with trusted enforcement points
US20050005133A1 (en) Proxy server security token authorization
CN109716725B (en) Data security system, method of operating the same, and computer-readable storage medium
CN114666341B (en) Method for implementing de-centralized SDP controller and computer storage medium
JP2022530406A (en) Improved transmission of data or messages on vehicles using the SOME / IP communication protocol
Yerlikaya et al. Authentication and authorization mechanism on message queue telemetry transport protocol
WO2002089444A1 (en) Method and system for authenticating a personal security device vis-a-vis at least one remote computer system
CN110855561A (en) Intelligent gateway of Internet of things
JP2010505334A (en) System and method for facilitating secure online transactions
US20090144436A1 (en) Reverse network authentication for nonstandard threat profiles
JP6266170B2 (en) Three-tier security and calculation architecture
Kato et al. Risk analysis and secure protocol design for WWW-based remote control with operation-privilege management
US20050097322A1 (en) Distributed authentication framework stack
WO2009005698A1 (en) Computer security system
Gagana et al. Secure Authentication and Security System for IoT Environment
Gupta et al. SeCrypt: A Password Manager
Mwikyaa et al. SHARING WEB SERVICES BETWEEN ENTERPRISES:" TRUSTED NETWORK
JP2006121440A (en) Medical system, medical data management method and communications program for medical data management
Prasetijo et al. Firewalling a Secure Shell Service
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载